Control, Control, Control

She also cites Mother Teresa—Catholic Idolatress. M. Teresa’s prayer: “Remember, o most gracious Virgin Mary, that never was it known that anyone who fled to your protection, implored your help or sought your intercession was left unaided. Inspired with this confidence we fly to You, o virgin of the virgins, our Mother. To you we come, before you we stand sinful and sorrowful. O Mother of the word incarnate, despise not our petitions, but in your clemency, hear and answer us. Amen.”

Under Chairman Mao of China, a communist terrorist, 43 million people died. This is 7 times the common figure provided for Hitler’s Holocaust. Please watch this informative video: http://www.youtube.com/watch?v=kJjrBZpsdfQ&feature=related I apologize for the rocky background music they added.

Nosotro on Mao: “The Chinese people were forced to bow three times, morning and evening, before an image of Mao in their workplaces. At railway stations passengers had to perform the ‘loyalty dance’ before they were permitted to board. Mao’s ‘Little Red Book’ of aphorisms was credited the power to work miracles and Mao was even said to have raised a man from the dead. The people of China and Mao broke the first commandment: ‘You shall have no other gods before me. You shall not make for yourself an idol in the form of anything in heaven above or on the earth beneath or in the waters below. You shall not bow down to them or worship them’ (Exodus 20:3-5). As it says in Romans 1:25, ‘They exchanged the truth of God for a lie, and worshipped and served created things rather than the Creator – who is forever praised. Amen.’”

“The Communist Party assumed control of all media in the country and used it to promote the image of Mao and the Party.”

TEL AVIV – President Obama’s presidential campaign focused on “making” the news media cover certain issues while rarely communicating anything to the press unless it was “controlled,” White House Communications Director Anita Dunn disclosed to the Dominican government at a videotaped conference.

“Very rarely did we communicate through the press anything that we didn’t absolutely control,” said Dunn.

“One of the reasons we did so many of the David Plouffe videos was not just for our supporters, but also because it was a way for us to get our message out without having to actually talk to reporters,” said Dunn, referring to Plouffe, who was Obama’s chief campaign manager.

“We just put that out there and made them write what Plouffe had said as opposed to Plouffe doing an interview with a reporter. So it was very much we controlled it as opposed to the press controlled it,” Dunn said.

Continued Dunn: “Whether it was a David Plouffe video or an Obama speech, a huge part of our press strategy was focused on making the media cover what Obama was actually saying as opposed to why the campaign was saying it, what the tactic was. … Making the press cover what we were saying.”

Dunn was speaking at a Jan. 12, 2009, event focusing on Obama’s media tactics and hosted by the Global Foundation for Democracy and Development, which seeks to promote collaboration between the U.S. And the Dominican Republic. The event was held in Santo Domingo and was attended by the country’s president.

CNET News has obtained a copy of the 55-page draft of S.773 (excerpt), which still appears to permit the president to seize temporary control of private-sector networks during a so-called cybersecurity emergency.

The new version would allow the president to “declare a cybersecurity emergency” relating to “non-governmental” computer networks and do what’s necessary to respond to the threat. Other sections of the proposal include a federal certification program for “cybersecurity professionals,” and a requirement that certain computer systems and networks in the private sector be managed by people who have been awarded that license.

“I think the redraft, while improved, remains troubling due to its vagueness,” said Larry Clinton, president of the Internet Security Alliance, which counts representatives of Verizon, Verisign, Nortel, and Carnegie Mellon University on its board. “It is unclear what authority Sen. Rockefeller thinks is necessary over the private sector. Unless this is clarified, we cannot properly analyze, let alone support the bill.”

… The Rockefeller proposal plays out against a broader concern in Washington, D.C., about the government’s role in cybersecurity. In May, President Obama acknowledged that the government is “not as prepared” as it should be to respond to disruptions and announced that a new cybersecurity coordinator position would be created inside the White House staff. Three months later, that post remains empty, one top cybersecurity aide has quit, and some wags have begun to wonder why a government that receives failing marks on cybersecurity should be trusted to instruct the private sector what to do.

…Probably the most controversial language begins in Section 201, which permits the president to “direct the national response to the cyber threat” if necessary for “the national defense and security.” The White House is supposed to engage in “periodic mapping” of private networks deemed to be critical, and those companies “shall share” requested information with the federal government. (“Cyber” is defined as anything having to do with the Internet, telecommunications, computers, or computer networks.)